Ug65 User Guide en
Ug65 User Guide en
Ug65 User Guide en
LoRaWAN® Gateway
UG65
User Guide
Preface
Thanks for choosing Milesight UG65 LoRaWAN® gateway. UG65 delivers tenacious
connection over network with full-featured design such as automated failover/failback,
extended operating temperature, hardware watchdog, VPN, Gigabit Ethernet and beyond.
This guide shows you how to configure and operate the UG65 LoRaWAN® gateway. You
can refer to it for detailed functionality and gateway configuration.
Readers
This guide is mainly intended for the following users:
- Network Planners
- On-site technical support and maintenance personnel
- Network administrators responsible for network configuration and maintenance
Related Documents
Document Description
UG65 Datasheet Datasheet for UG65 LoRaWAN® gateway.
UG65 Quick Start Guide Quick Installation Guide for UG65 LoRaWAN® gateway.
Declaration of Conformity
UG65 is in conformity with the essential requirements and other relevant provisions of the
CE, FCC, and RoHS.
2
For assistance, please contact
Milesight technical support:
Email: iot.support@milesight.com
Support Portal: support.milesight-iot.com
Tel: 86-592-5085280
Fax: 86-592-5023065
Address: Building C09, Software Park III,
Xiamen 361024, China
Revision History
Date Doc Version Description
Aug. 31, 2020 V1.0 Initial version
Dec. 10, 2020 V2.0 Layout replace
1. Support LoRaWAN® Class B
2. Add Node-RED feature
Apr. 30, 2021 V2.1 3. Add Noise-Analyzer feature
4. Add Multicast Group feature
5. Add application examples
1. Support Yeastar Workplace platform integration
Aug. 24, 2021 V2.2 2. Delete Package Forward status page
3. Phone & Email webpage update
1. Add AS923-3&AS923-4
Dec. 15, 2021 V2.3 2. Change network server channel mask box to channel
3. Add device channel setting in profile
1. Add batch backup
2. Log in webpage update
Feb. 18, 2022 V2.4
3. Change default antenna type to external antenna
4. Adjust time of Class C ACK timeout
1. Support VLAN Trunk client
Jun. 1, 2022 V2.5 2. Add System Name in SNMP
3. Add Use L2TP Peer DNS option
1. Add BACnet Server feature
2. Add Payload Codec feature
Dec.26, 2022 V2.6
3. Add Reset and all flows export feature on Node-RED
4. Add data retransmission feature on Packet Forward
1. Compatible with Milesight Development Platform
2. Update default secondary ICMP and DNS server
address
Feb. 21, 2024 V2.7
3. Add cellular IMS and custom MTU feature
4. Add 8 pre-set device profiles
5. Add beacon time offset setting
1. Support to import ovpn file for OpenVPN connection;
June 7, 2024 V2.8
2. Support packet filter feature;
3
3. Add default WLAN connection password;
4. Add username on SMTP client setting;
5. Add BACnet object types, support object instance
customization.
4
Contents
5
3.4.1.3 Cellular (Cellular Version Only) .............................................................. 57
3.4.1.4 Loopback .................................................................................................60
3.4.1.5 VLAN Trunk ............................................................................................. 61
3.4.2 Firewall ............................................................................................................... 61
3.4.2.1 Security ....................................................................................................62
3.4.2.2 ACL .......................................................................................................... 62
3.4.2.4 Port Mapping (DNAT) .............................................................................64
3.4.2.3 DMZ ......................................................................................................... 65
3.4.2.5 MAC Binding ........................................................................................... 65
3.4.3 DHCP .................................................................................................................. 66
3.4.4 DDNS .................................................................................................................. 67
3.4.5 Link Failover .......................................................................................................68
3.4.5.1 SLA ...........................................................................................................68
3.4.5.2 Track ........................................................................................................68
3.4.5.3 WAN Failover .......................................................................................... 70
3.4.6 VPN .....................................................................................................................70
3.4.6.1 DMVPN .................................................................................................... 71
3.4.6.2 IPSec ........................................................................................................72
3.4.6.3 GRE .......................................................................................................... 75
3.4.6.4 L2TP ........................................................................................................ 76
3.4.6.5 PPTP ........................................................................................................78
3.4.6.6 OpenVPN Client ...................................................................................... 80
3.4.6.7 OpenVPN Server ..................................................................................... 82
3.4.6.8 Certifications ...........................................................................................85
3.5 System .......................................................................................................................... 86
3.5.1 General Settings ................................................................................................ 86
3.5.1.1 General .................................................................................................... 86
3.5.1.2 System Time ........................................................................................... 88
3.5.1.3 SMTP ....................................................................................................... 88
3.5.1.4 Phone .......................................................................................................89
3.5.1.5 Email ........................................................................................................90
3.5.2 User Management ............................................................................................. 90
3.5.2.1 Account ................................................................................................... 91
3.5.2.2 User Management .................................................................................. 91
3.5.3 SNMP ................................................................................................................. 92
3.5.3.1 SNMP .......................................................................................................92
3.5.3.2 MIB View ................................................................................................. 93
3.5.3.3 VACM .......................................................................................................93
3.5.3.4 Trap ..........................................................................................................94
3.5.3.5 MIB ...........................................................................................................95
3.5.4 Device Management ......................................................................................... 95
3.5.4.1 Auto Provision .........................................................................................95
3.5.4.2 Management Platform ........................................................................... 96
3.5.5 Events .................................................................................................................97
6
3.5.5.1 Events ...................................................................................................... 97
3.5.5.2 Events Settings ....................................................................................... 98
3.6 Maintenance .................................................................................................................99
3.6.1 Tools ...................................................................................................................99
3.6.1.1 Ping ..........................................................................................................99
3.6.1.2 Traceroute ...............................................................................................99
3.6.1.3 Qxdmlog ................................................................................................ 100
3.6.2 Schedule .......................................................................................................... 100
3.6.3 Log ....................................................................................................................101
3.6.3.1 System Log ........................................................................................... 101
3.6.3.2 Log Settings .......................................................................................... 101
3.6.4 Upgrade ............................................................................................................102
3.6.5 Backup and Restore ........................................................................................ 103
3.6.6 Reboot ..............................................................................................................104
3.7 APP ............................................................................................................................. 105
3.7.1 Python .............................................................................................................. 105
3.7.1.1 Python ................................................................................................... 105
3.7.1.2 App Manager Configuration ................................................................ 106
3.7.1.3 Python App ............................................................................................106
3.7.2 Node-RED .........................................................................................................107
3.7.2.1 Node-RED .............................................................................................. 107
Chapter 4 Application Examples .............................................................................................110
4.1 Restore Factory Defaults ........................................................................................... 110
4.2 Firmware Upgrade ......................................................................................................111
4.3 Ethernet Connection .................................................................................................. 111
4.4 Cellular Connection (Cellular Version Only) ............................................................. 112
4.5 Wi-Fi Application Example .........................................................................................114
4.5.1 AP Mode .......................................................................................................... 114
4.5.2 Client Mode ......................................................................................................115
4.6 Packet Forwarder Configuration ...............................................................................117
4.7 Connect to Milesight IoT Cloud ................................................................................ 118
4.8 Application Configuration ..........................................................................................120
4.9 Device Configuration ................................................................................................. 123
4.10 Send Data to Device .................................................................................................124
4.11 Node-RED ................................................................................................................. 126
4.11.1 Start the Node-RED ....................................................................................... 126
4.11.2 Send Data by Email ....................................................................................... 127
7
Chapter 1 Product Introduction
1.1 Overview
UG65 is a robust 8-channel indoor LoRaWAN® gateway. Adopting SX1302 LoRa chip and
high-performance quad-core CPU, UG65 supports connection with more than 2000 nodes.
UG65 has line of sight up to 15 km and can cover about 2 km in urbanized environment,
which is ideally suited to smart office, smart building and many other indoor applications.
UG65 supports not only multiple back-haul backups with Ethernet, Wi-Fi and cellular, but
also has integrated mainstream network servers (such as The Things Industries,
ChirpStack, etc.) and built-in network server and Milesight IoT Cloud for easy deployment.
Figure 1-1
1.2 Advantages
Benefits
- Built-in industrial CPU and big memory
- Ethernet, 2.4GHz Wi-Fi and global 2G/3G/LTE options make it easy to get connected
- Embedded network server and compliant with several third party network servers
- MQTT(s) or HTTP(s) protocol for data transmission to application server
- Rugged enclosure, optimized for wall or pole mounting
- 3-year warranty included
8
Easy Maintenance
- Milesight DeviceHub provides easy setup, mass configuration, and centralized
management of remote devices
- The user-friendly web interface design and various upgrading options help
administrator to manage the device as easy as pie
- Web GUI and CLI enable the admin to achieve quick configuration and simple
management among a large quantity of devices
- Users can efficiently manage the remote devices on the existing platform through the
industrial standard SNMP
Capabilities
- Link remote devices in an environment where communication technologies are
constantly changing
- Industrial quad core 64-bit ARM Cortex-A53 processor, high-performance operating up
to 1.5 GHz with low power consumption, and 8GB eMMC available to support more
applications
- Support wide operating temperature ranging from -40°C to 70°C/-40°F to 158°F
1.3 Specifications
Hardware System
CPU Quad-core 1.5GHz, 64-bit ARM Cortex-A53
Memory 8 GB eMMC Flash, 512 MB DDR4 RAM
LoRaWAN
Fully Integrated and Internal Antenna
Antenna
(Optional: 1 × 50 Ω N-Female External Connector)
Channel 8
CN470/IN865/EU868/RU864/US915/AU915/KR920/AS923-1&2&3&
Frequency Band
4
Sensitivity -140dBm Sensitivity @292bps
Output Power 27dBm Max
Protocol V1.0 Class A/Class B/Class C and V1.0.2 Class A/Class B/Class C
Ethernet
Ports 1 × RJ-45 (PoE PD supported)
Physical Layer 10/100/1000 Base-T (IEEE 802.3)
9
Data Rate 10/100/1000 Mbps (auto-sensing)
Interface Auto MDI/MDIX
Mode Full or half duplex (auto-sensing)
Wi-Fi Interfaces
Antenna Fully Integrated and Internal Antenna
Standards IEEE 802.11 b/g/n, 2.4 GHz
802.11b: 18 dBm +/-2.0 dBm (11 Mbps)
802.11g: 15 dBm +/-2.0 dBm (6 Mbps)
802.11g: 15 dBm +/-2.0 dBm (54 Mbps)
Tx Power 802.11n@2.4 GHz: 14 dBm +/-2.0 dBm (MCS0_HT20)
802.11n@2.4 GHz: 14 dBm +/-2.0 dBm (MCS7_HT20)
802.11n@2.4 GHz: 13 dBm +/-2.0 dBm (MCS0_HT40)
802.11n@2.4 GHz: 13 dBm +/-2.0 dBm (MCS7_HT40)
Cellular Interfaces (Optional)
Antenna Internal Antenna
SIM Slots 1
Software
Network PPPoE, SNMP v1/v2c/v3, TCP, UDP, DHCP, DDNS, HTTP, HTTPS,
Protocols DNS, SNTP, Telnet, SSH, MQTT, MQTTS, BACnet/IP etc.
VPN Tunnel DMVPN/IPsec/OpenVPN/PPTP/L2TP/GRE
Firewall ACL/DMZ/Port Mapping/MAC Binding
Web, CLI, SMS, On-demand dial up, DeviceHub, Milesight IoT Cloud,
Management
Yeastar Workplace Platform, Milesight Development Platform
App Python SDK, Node-RED
Power Supply and Consumption
1. DC Jack Connector for 9-24 VDC power supply
Power Supply
2. 1 × 802.3 af PoE input
Consumption Typical 2.9W, Max 4.2W
Physical Characteristics
Ingress Protection IP65
Dimensions 180 x 110 x 56.5 mm
Mounting Desktop, Wall or Pole Mounting
Others
Reset Button 1 × RST
10
LED Indicators 1 × POWER, 1 × STATUS, 1 × LoRa, 1 × Wi-Fi, 1 × LTE, 1 × ETH
Built-in Watchdog, RTC, Timer
Environmental
Operating -40°C to +70°C (-40°F to +158°F)
Temperature Reduced cellular performance above 60°C
Storage
-40°C to +85°C (-40°F to +185°F)
Temperature
Ethernet Isolation 1.5 kV RMS
Relative Humidity 0% to 95% (non-condensing) at 25°C/77°F
11
Chapter 2 Access to Web GUI
This chapter explains how to access to Web GUI of the UG65.
Username: admin
Password: password
If you enter the username or password incorrectly more than 5 times, the login page
will be locked for 10 minutes.
4. After logging the web GUI, follow the guide to complete the basic configurations. It’s
suggested that you change the password for the sake of security.
12
5. You can view system information and perform configuration of the gateway.
13
3. Open a Web browser on your PC (Chrome is recommended) and type in the IP address
192.168.23.150 to access the web GUI.
4. Enter the username and password, click “Login”.
If you enter the username or password incorrectly more than 5 times, the login page
will be locked for 10 minutes.
5. After logging the web GUI, follow the guide to complete the basic configurations. It’s
suggested that you change the password for the sake of security.
14
6. After guide complete, you can view system information and perform configuration of
the gateway.
15
Chapter 3 Web Configuration
3.1 Status
3.1.1 Overview
You can view the system information of the gateway on this page.
Figure 3-1-1-1
System Information
Item Description
Model Show the model name of gateway.
Region Show the LoRaWAN® frequency region of gateway.
Serial Number Show the serial number of gateway.
Firmware Version Show the currently firmware version of gateway.
Hardware Version Show the currently hardware version of gateway.
Local Time Show the currently local time of system.
Show the information on how long the gateway has been
Uptime
running.
CPU Load Show the current CPU utilization of the gateway.
RAM (Capacity/Available) Show the RAM capacity and the available RAM memory.
eMMC (Capacity/Available) Show the eMMC capacity and the available eMMC memory.
Table 3-1-1-1 System Information
16
When Milesight UPS is connected to the device, the UPS basic information will also show
on the Status page. For more details please refer to Milesight UPS User Guide.
Figure 3-1-1-2
3.1.2 Cellular
You can view the cellular network status of gateway on this page.
Figure 3-1-2-1
17
Modem Information
Item Description
Status Show corresponding detection status of module and SIM card.
Model Show the model name of cellular module.
Version Show the version of cellular module.
Signal Level Show the cellular signal level.
Register Status Show the registration status of SIM card.
IMEI Show the IMEI of the module.
IMSI Show IMSI of the SIM card.
ICCID Show ICCID of the SIM card.
ISP Show the network provider which the SIM card registers on.
Network Type Show the connected network type, such as LTE, 3G, etc.
PLMN ID Show the current PLMN ID, including MCC, MNC, LAC and Cell ID.
LAC Show the location area code of the SIM card.
Cell ID Show the Cell ID of the SIM card location.
Table 3-1-2-1 Modem Information
Figure 3-1-2-2
Network Status
Item Description
Status Show the connection status of cellular network.
IP Address Show the IP address of cellular network.
Netmask Show the netmask of cellular network.
Gateway Show the gateway of cellular network.
DNS Show the DNS of cellular network.
Connection Duration Show information on how long the cellular network has been connected.
Table 3-1-2-2 Network Status
3.1.3 Network
On this page you can check the Ethernet port status of the gateway.
18
Figure 3-1-3-1
Network
Item Description
Port Show the name of the Ethernet port.
Show the status of the Ethernet port. "Up" refers to a status that WAN
Status is enabled and Ethernet cable is connected. "Down" means Ethernet
cable is disconnected or WAN function is disabled.
Type Show the dial-up type of the Ethernet port.
IP Address Show the IP address of the Ethernet port.
Netmask Show the netmask of the Ethernet port.
Gateway Show the gateway of the Ethernet port.
DNS Show the DNS of the Ethernet port.
Show the information about how long the Ethernet cable has been
Duration connected to the Ethernet port when the port is enabled. Once the port
is disabled or Ethernet cable is disconnected, the duration will stop.
Table 3-1-3-1 WAN Status
3.1.4 WLAN
You can check Wi-Fi status on this page, including the information of access point and
client.
19
Figure 3-1-4-1
WLAN Status
Item Description
Wireless Status Show the wireless status.
MAC Address Show the MAC address.
Interface Type Show the interface type, such as "AP" or “Client".
SSID Show the SSID.
Channel Show the wireless channel.
Encryption Type Show the encryption type.
Status Show the connection status.
IP Address Show the IP address of the gateway.
Netmask Show the wireless MAC address of the gateway.
Gateway Show the gateway address in wireless network.
Connection Duration Show information on how long the Wi-Fi network has been connected.
Table 3-1-4-1 WLAN Status
Figure 3-1-4-2
Associated Stations
Item Description
IP Address Show the IP address of access point or client.
MAC Address Show the MAC address of the access point or client.
Connection Duration Show information on how long the Wi-Fi network has been
20
connected.
Table 3-1-4-2 WLAN Status
3.1.5 VPN
You can check VPN status on this page, including PPTP, L2TP, IPsec, OpenVPN and
DMVPN.
Figure 3-1-5-1
Figure 3-1-5-2
21
Figure 3-1-5-3
VPN Status
Item Description
Name Show the name of the VPN tunnel.
Status Show the status of the VPN tunnel.
Local IP Show the local tunnel IP of VPN tunnel.
Remote IP Show the remote tunnel IP of VPN tunnel.
Table 3-1-5-1 VPN Status
Figure 3-1-6-1
Host List
Item Description
DHCP Leases
IP Address Show IP address of DHCP client
MAC Address Show MAC address of DHCP client
Lease Time Remaining Show the remaining lease time of DHCP client.
MAC Binding
IP & MAC Show the IP address and MAC address set in the Static IP
22
list of DHCP service.
Table 3-1-6-1 Host List Description
3.2 LoRaWAN
3.2.1.1 General
Figure 3-2-1-1
General Settings
Item Description
Gateway EUI Show the unique identifier of the gateway and it’s non-editable.
Fill in the corresponding ID which you’ve used for registering the
Gateway ID
gateway to the remote network server. It is usually the same as
23
gateway EUI and can be changed.
Sync frequency configurations from the network server by selecting
Frequency-Sync
the corresponding multi-destination ID.
When the gateway connects to a single
Chirpstack/Semtech/Remote Embedded NS/Basic Station type
Data
package forwarder, it supports data storage of up to 1 million pieces
Retransmission
of data when the network is disconnected and re-transmits the data
after network recovery.
The gateway will forward the data to the network server address
Multi-Destination
that was created and enabled in the list.
Connection
Show the connection status of the package forwarder.
Status
Table 3-2-1-1 General Setting Parameters
Figure 3-2-1-2
Packet Filters
Parameters Description
Select the filter mode as black list or white list.
White List: Only forward the packets on this list to the network
Filters by NetID
server.
Default Mode
Black List: Only forward the packets except this list to the network
server.
Proprietary This only works when the packet forwarder type is Milesight
Message Filter Development Platform LNS or DeviceHub LNS.
Filters by NetID Forward/Not forward the uplink packets that match the NetID.
Filters by JoinEUI Forward/Not forward the join request packets that match the
24
JoinEUI range.
Forward/Not forward the join request packets that match the DevEUI
Filters by DevEUI
range.
Set the specific filtering value or range list. Every condition supports
List
to add 5 lists at most.
Table 3-2-1-2 Packet Filters Parameters
Note:
1. When join EUI and dev EUI are both configured, only packets that match both conditions
will be forwarded.
2. This feature is not supported when the packet forwarder type is Loriot or Everynet.
3. When a third-party network server assigns filter condition to gateway, the gateway will
use network server settings in priority.
3.2.1.2 Radios
Figure 3-2-1-3
Figure 3-2-1-4
25
Item Description
Antenna
Select the transmission type of antennas when using EA version.
Type
Choose the LoRaWAN® frequency plan used for the upstream and downlink
Region frequencies and datarates. Available channel plans depend on the gateway’s
model.
Center
Change the frequencies to receive packets from LoRaWAN® nodes.
Frequency
Table 3-2-1-3 Radio Channels Setting Parameters
Figure 3-2-1-5
Figure 3-2-1-6
26
Figure 3-2-1-7
Figure 3-2-1-8
Noise Analyzer
Item Description Default
Enable Click to enable noise analyzer feature. Disabled
Sweep Freq Select the frequency sweeping range. General Feq
27
General Freq: frequencies based on the LoRaWAN®
regional parameters document
Custom: custom the frequency range
Enable the noise analyzer continuously or within a
period of time.
If Custom is selected, the noise analyzer will stop
Sweep Time automatically after the pre-configured time. Custom/24h
Note: It’s suggested to custom the time since noise
analyzer feature will affect the normal data
transmission.
Table 3-2-1-7 Noise Analyzer Setting Parameters
3.2.1.4 Advanced
This section is about settings in details of beacon transmitting and validating.
Figure 3-2-1-9
Advanced-Beacon Setting
Item Description Default
Interval of gateway sending beacons for Class B
Beacon Period device time synchronization. 0 means the gateway 0
will not send beacons.
Based on the
Beacon Freq The frequency of beacons. supported
frequency
Based on the
Beacon
The datarate of beacons. supported
Datarate
frequency
Beacon Channel When selecting Custom, it allows users to custom
1
Number range from 1 to 8.
28
Beacon Freq
Frequency interval of beacons. 200000
Step
Beacon
The bandwidth of beacons. Unit: Hz 12500 Hz
Bandwidth
Based on the
Beacon TX
The TX power of beacons. supported
Power
frequency
Add this offset to system time and assign the time
Beacon Time result to class B devices. This can avoid the
0
Offset interference when multiple class B devices are
close.
Table 3-2-1-8 Advanced-Beacon Parameters
Figure 3-2-1-10
29
3.2.1.5 Custom
When Custom Configuration mode is enabled, you can write your own packet forwarder
configuration file in the edit box to configure packet forwarder. Click “Save” to save your
custom configuration file content, and click “Apply” to take effect. You can click “Clear” to
erase all content in the edit box. If you don’t know how to write configuration file, please
click “Example” to go to reference page.
Note: customized configuration will overwrite the packet forward configurations of web
GUI.
Figure 3-2-1-11
3.2.1.6 Traffic
When navigating to the traffic page, any recent traffic received by the gateway will display.
To watch live traffic, click Refresh.
30
Figure 3-2-1-12
Item Description
Refresh Click to obtain the latest data.
Clear Click to clear all data.
Rfch Show the channel of this packet.
Direction Show the direction of this packet.
Time Show the receiving time of this packet.
Ticks Show the ticks of this packet.
Frequency Show the frequency of the channel.
Datarate Show the datarate of the channel.
Coderate Show the coderate of this packet.
RSSI Show the received signal strength.
SNR Show the signal to noise ratio of this packet.
Table 3-2-1-10 Traffic Parameters
3.2.2.1 General
Figure 3-2-2-1
31
Cloud or Yeastar Workplace platform .
NetID Enter the network identifier. 010203
Enter the interval time between when the
end-device sends a Join_request_message to
Join Delay network server and when the end-device prepares 5
to open RX1 to receive the Join_accept_message
sent from network server.
Enter the interval time between when the
end-device sends uplink packets and when the
RX1 Delay 1
end-device prepares to open RX1 to receive the
downlink packet.
Enter the amount of time till a successful join
expires. The format is hours-minutes-seconds. If
Lease Time the join-type is OTAA, then the end-devices need 876000-00-00
to join the network server again when it exceeds
the lease time.
Log level Choose the log level. Info
Channel Plan Setting
Choose LoRaWAN® channel plan used for the
Depend on the
upstream and downlink frequencies and
Channel Plan gateway’s
datarates. Available channel plans depend on the
frequency
gateway’s model.
Allow end devices to communicate with specific
frequency channels.
Leave it blank means using all the default
standard usable channels specified in the
LoRaWAN® regional parameters document. Depend on the
Channel It allows to enter the index of the channels. gateway’s
Examples: frequency
1, 40: Enabling Channel 1 and Channel 40
1-40: Enabling Channel 1 to Channel 40
1-40, 60: Enabling Channel 1 to Channel 40 and
Channel 60
Table 3-2-2-1 General Parameters
Note: For some regional variants, if allowed by your LoRaWAN® region, you can use
Additional Plan to configure additional channels undefined by the LoRaWAN® Regional
Parameters, like EU868 and KR920, as the following picture shows:
Figure 3-2-2-2
32
Additional Channels
Item Description
Frequency/MHz Enter the frequency of the additional plan.
Enter the max datarate for the end-device. The range is based on
Max Datarate what is specified in the LoRaWAN® regional parameters
document.
Enter the min datarate for the end-device. The range is based on
Min Datarate
what is specified in the LoRaWAN® regional parameters document.
Table 3-2-2-2 Additional Plan Parameters
3.2.2.2 Application
An application is a collection of devices with the same purpose/of the same type. Users
can add a series of devices to the same application which needs to send to the same
server.
You can edit the application by clicking or create a new application by clicking .
Figure 3-2-2-3
Application
Item Description
Enter the name of the application profile.
Name
E.g: smoker-sensor-app.
Enter the description of this application.
Description
E.g: an application for smoker sensor.
Data will be sent to your custom server using the MQTT, HTTP,
Data
HTTPS or BACnet/IP protocol. One application can add 3 data
Transmission
transmissions at most and every protocol can be selected only once.
Table 3-2-2-3 Application Parameters
MQTT Integration
33
Figure 3-2-2-4
Figure 3-2-2-5
MQTT Settings
Item Description
General
Broker
MQTT broker address to receive data.
Address
Broker Port MQTT broker port to receive data.
Client ID is the unique identity of the client to the server.
Client ID It must be unique when all clients are connected to the same server, and
it is the key to handle messages at QoS 1 and 2.
34
Connection If the client does not get a response after the connection timeout, the
Timeout/s connection will be considered as broken. The Range: 1-65535.
Keep Alive After the client is connected to the server, the client will send heartbeat
Interval/s packet to the server regularly to keep alive. Range: 1-65535.
User Credentials
Enable Enable user credentials.
Username The username used for connecting to the MQTT broker.
Password The password used for connecting to the MQTT broker.
TLS
Enable Enable the TLS encryption in MQTT communication.
Select from “Self signed certificates”, “CA signed server certificate”.
CA signed server certificate: verify with the certificate issued by
Mode Certificate Authority (CA) that pre-loaded on the device.
Self signed certificates: upload the custom CA certificates(.crt or .pem),
client Certificates(.crt) and secret key(.key) for verification.
Topic
Data type to communicate with MQTT broker:
Uplink Data: receive device uplink packets
Downlink Data: send downlink commands to device
Multicast Downlink Data: send downlink commands to multicast group
Data Type Join Notification: receive join request packets from devices
ACK Notification: receive ACK packets from devices
Error Notification: receive error packets from devices
Request data: send requests to enquire and configure the gateway NS
Response data: receive the request responses
Topic Topic name of the data type used for publishing.
QoS 0 – Only Once
This is the fastest method and requires only 1 message. It is also the
most unreliable transfer mode.
QoS 1 – At Least Once
This level guarantees that the message will be delivered at least once,
QoS
but may be delivered more than once.
QoS 2 – Exactly Once
QoS 2 is the highest level of service in MQTT. This level guarantees that
each message is received only once by the intended recipients. QoS 2 is
the safest and slowest quality of service level.
Table 3-2-2-4 MQTT Settings Parameters
Note: if MQTT broker type is HiveMQ, please enable TLS and set the option as CA signed
server certificate.
35
HTTP/HTTPS Integration
Figure 3-2-2-6
HTTP/HTTPS Settings
Item Description
HTTP Header
Header Name A core set of fields in the HTTP header.
Header Value Value of the HTTP header.
URL
Data Type Data type sent to HTTP/HTTPS server.
Topic Topic name of the data type used for publishing.
URL HTTP/HTTPS server URL to receive data.
Table 3-2-2-5 HTTP/HTTPS Settings Parameters
36
Figure 3-2-2-7
37
Figure 3-2-2-8
38
3.2.2.4 Profiles
A Profile defines the device capabilities and boot parameters that are needed by the Netwo
rk Server for setting the LoRaWAN® radio access service. These information elements shall
be provided by the end-device manufacturer. UG65 has pre-configured 8 device files and
users can also create a new device profile.
Figure 3-2-2-9
Figure 3-2-2-10
39
Figure 3-2-2-11
40
C.
Table 3-2-2-9 Device Profiles Advanced Setting Parameters
3.2.2.5 Device
A device is the end-device connecting to, and communicating over the LoRaWAN® network.
Figure 3-2-2-12
Item Description
Add Add a device.
Bulk Import Download template and import multiple devices.
Delete All Delete all devices in the list.
Device Name Show the name of the device.
Device EUI Show the EUI of the device.
Device-Profile Show the name of the device’s device profile.
Application Show the name of the device’s application.
Last Seen Show the time of last packet received.
41
Figure 3-2-2-13
Device Configuration
Item Description
Device Name Enter the name of this device.
Description Enter the description of this device.
Device EUI Enter the EUI of this device.
Device-Profile Choose the device profile.
Application Choose the application profile.
Payload Codec Choose the payload codec existed on Payload Codec page.
Enter the downlink port of device, it’s 85 by default for Milesight
fPort
devices.
Choose from: "Disable", "Modbus RTU to TCP", "Modbus RTU over
TCP". This feature is only applicable to Milesight LoRaWAN®
Modbus RTU controllers.(UC501/UC300, etc.)
Data Modbus RTU to TCP: TCP client can send Modbus TCP commands
Transmission to ask for controller Modbus data.
Modbus RTU over TCP: TCP client can send Modbus RTU
commands to ask for controller Modbus data.
Modbus RTU Enter the LoRaWAN® frame port for transparent transmission
Fport between Milesight LoRaWAN® controllers and UG65.
42
Range: 2-84, 86-223.
Note: this value must be the same as the Milesight LoRaWAN®
controller’s fPort.
Enter the TCP port for data transmission between the TCP Client and
TCP Port
UG65 (as TCP Server).Range: 1-65535.
Frame-Counter If disable the frame-counter validation, it will compromise security as
Validation it enables people to perform replay-attacks.
Whenever an end-device joins a network via over-the-air activation,
Application Key
the application key is used for derive the Application Session key.
The device address identifies the end-device within
Device Address
the current network.
The network session key specific for the end-device. It is used by the
Network
end-device to calculate the MIC or part of the MIC (message integrity
Session Key
code) of all uplink data messages to ensure data integrity.
The AppSKey is an application session key specific for the
Application end-device. It is used by both the application server and the
Session Key end-device to encrypt and decrypt the payload field of
application-specific data messages.
The number of data frames which sent uplink to the network server.
It will be incremented by the end-device and received by the
Uplink end-device.
Frame-counter Users can reset the a personalized end-device manually, then the
frame counters on the end-device and the frame counters on the
network server for that end-device will be reset to 0.
The number of data frames which received by the end-device
downlink from the network server. It will be incremented by the
Downlink network server.
Frame-counter Users can reset the a personalized end-device manually, then the
frame counters on the end-device and the frame counters on the
network server for that end-device will be reset to 0.
Table 3-2-2-11 Device Setting Parameters
43
Figure 3-2-2-14
Item Description
Add Add a multicast group.
Group Name Show the name of the group.
Number of Devices Show the device number of the group.
Operation Edit or delete the multicast group.
Table 3-2-2-12 Multicast Group Parameters
Figure 3-2-2-15
44
Class Type Class B and Class C are optional.
Datarate Datarate of the node receiving downlinks.
Frequency Downlink frequency of all devices in this group.
The number of data frames which received by the end-device
Frame-counter downlink from the network server. It will be incremented by the
network server.
Ping Slot Period of opening the pingslot. This is only applied to Class B end
Periodicity devices.
Selected Devices Show all device names in this group.
Add Device Add devices in the pull-down list.
Table 3-2-2-13 Multicast Group Setting Parameters
Figure 3-2-2-16
Item Description
Gateway ID Show the gateway ID.
Name Show the name of the gateway.
Status Show the connection status of the gateway.
Last Seen Show the time of last packet received.
Operation Edit or delete the gateway.
Table 3-2-2-14 Gateway Fleet Parameters
Figure 3-2-2-17
45
Item Description
Gateway ID Enter the unique gateway ID to recognize the gateway.
Name Enter the name of this gateway.
GPS data of the gateway can be edited here. If gateway sends GPS
Location
data it will replace your customized data.
Table 3-2-2-15 Gateway Setting Parameters
3.2.2.8 Packets
Figure 3-2-2-18
Network Server
Item Description
Device EUI/Group Show the EUI of the device or multicast group.
Frequency Show the used frequency to transmit packets.
46
Datarate Show the used datarate to transmit packets.
SNR Show the signal-noise ratio.
RSSI Show the received signal strength indicator.
Size Show the size of payload.
Fcnt Show the frame counter.
Show the type of the packet:
JnAcc - Join Accept Packet
JnReq - Join Request Packet
UpUnc - Uplink Unconfirmed Packet
Type UpCnf - Uplink Confirmed Packet - ACK response from
network requested
DnUnc - Downlink Unconfirmed Packet
DnCnf - Downlink Confirmed Packet- ACK response from
end-device requested
Time Show the time of packet was sent or received.
Table 3-2-2-17 Packet Parameters
Figure 3-2-2-19
Item Description
Dev
Addr/Multicast Show the address of the device/multicast group.
Addr
GwEUI Show the EUI of the gateway.
AppEUI Show the EUI of the application.
DevEUI/Group
Show the EUI of the device/multicast group name.
Name
Class Type Show the class type of the device or multicast group.
47
True: Device may transmit an explicit (possibly empty)
Immediately acknowledgement data message immediately after the reception of a
data message requiring a confirmation.
Timestamp Show the timestamp of this packet.
Show the type of the packet:
JnAcc - Join Accept Packet
JnReq - Join Request Packet
UpUnc - Uplink Unconfirmed Packet
Type UpCnf - Uplink Confirmed Packet - ACK response from network
requested
DnUnc - Downlink Unconfirmed Packet
DnCnf - Downlink Confirmed Packet- ACK response from end-device
requested
True: The end-node has enabled ADR.
Adr
False: The end-node has not enabled ADR.
In order to validate that the network is receiving the uplink messages,
nodes periodically transmit ADRACKReq message. This is 1 bit long.
True: Network should respond in ADR_ACK_DELAY time to confirm that
AdrAcKReq
it is receiving the uplink messages.
False: ADR is disabled or Network does not respond in
ADR_ACK_DELAY.
True: This frame is ACK.
Ack
False: This frame is not ACK.
Show the frame-counter of this packet.The network server tracks the
Fcnt uplink frame counter and generates the
downlink counter for each end-device.
FPort is a multiplexing port field. If the frame payload field is not
empty, the port field must be present. If present, a FPort
FPort 16 value of 0 indicates that the FRMPayload contains MAC commands
only.When this is the case, the FOptsLen field must be zero. FOptsLen
is the length of the FOpts field in bytes.
Modulation LoRa means the physical layer uses the LoRa modulation.
Bandwidth Show the bandwidth of this channel.
SpreadFactor Show the spreadFactor of this channel.
Bitrate Show the bitrate of this channel.
CodeRate Show the coderate of this channel.
SNR Show the SNR of this channel.
RSSI Show the RSSI of this channel.
Power Show the transmit power of the device.
Payload (b64) Show the application payload of this packet.
Payload (hex) Show the application payload of this packet.
Json Show the data after decoded.
Show the MIC of this packet. MIC is a cryptographic message integrity
MIC
code, computed over the fields MHDR, FHDR, FPort and the encrypted
48
FRMPayload.
Table 3-2-2-18 Packets Details Parameters
Related Topic
Figure 3-3-1-1
Server Settings
Item Description
Enable Enable or disable BACnet server function.
Set communication port of BACnet/IP. Range: 1-65535.
UDP Port
The default port is 47808.
The unique BACnet device identifier which needs to avoid conflict
Device ID
with other devices.
Device Name The device name to represent the device.
Enable BBMD(BACnet/IP Broadcast Management Device) if
BBMD
BACnet devices of different network subnets should work together.
IP Address Fill in the IP address of BBMD device or external device registrar.
IP Port Fill in the UDP/IP port for external device registration.
Time TO Live Number of seconds used on external device registration.
Table 3-3-1-1 Server Parameters
49
3.3.1.2 BACnet Object
Figure 3-3-1-2
Item Description
Add a BACnet object. The gateway supports adding 2000
Add
objects at most.
Bulk Import Download template and import multiple BACnet objects.
Bulk Export Export all generated BACnet object settings.
Delete All Delete all objects in the list.
Object Name Show the name of the BACnet object.
Object Type Show the type of this object.
Object Instance Nr Show the instance number of this object.
Present Value Show the latest value of object.
Units Show the unit of this object value.
Updates Show the update times of this object value.
Update time Show the time for this object to get and update the data.
COV Show if COV (Change of value) is enabled.
Operation Edit or delete the object.
Table 3-3-1-2 BACnet Object List Parameters
Figure 3-3-1-3
50
Device Name Select the device added on Network Server > Device page.
LoRa Object Select one of device variables as an object.
Object Name Customize an unique name for this object.
Select the object type as binary input/output/value, analog
Object Type input/output/value, multistate input/output/value and
charcterString value.
The Object
Customize the object instance.
Instance
Description Enter the description of this object.
Analog Input/Output/Value
Units Select the unit of this object value.
When object value changes, the BACnet server (gateway) will send
COV notification of new value to BACnet client. This only applies to
analog type objects.
Only when the object value reaches or over this increment, the
COV Increment
BACnet server (gateway) will send the notification.
Relinquish If there is no command, the analog output will be set as this
Default relinquish default value.
Binary Input/Output/Value
Polarity Define the binary input/output status as Normal or Reverse.
Characterize the intended effect of active state of binary type object
Active Text value. Example: when a button is pressed and binary input is 1,
active text can be defined as “Pressed”.
Characterize the intended effect of inactive state of binary type
Inactive Text object value. Example: for a button, inactive text can be defined as
“Unpressed”.
Relinquish If there is no command, the binary output will be set as this
Default relinquish default value.
MultiState Input/Output/Value
Number of
Set the number of states and define the name of every state.
States
Relinquish If there is no command, the multistate output will be set as this
Default relinquish default value.
Table 3-3-1-3 BACnet Object Configuration Parameters
3.4 Network
3.4.1 Interface
3.4.1.1 Port
The Ethernet port can be connected with Ethernet cable to get Internet access. It supports
3 connection types.
51
- Static IP: configure IP address, netmask and gateway for Ethernet WAN interface.
- DHCP Client: configure Ethernet WAN interface as DHCP Client to obtain IP address
automatically.
- PPPoE: configure Ethernet WAN interface as PPPoE Client.
Figure 3-4-1-1
Port Setting
Item Description Default
Port The port that is fixed as eth0 port and enabled. eth 0
Connection
Select from "Static IP", "DHCP Client" and "PPPoE". Static IP
Type
MTU Set the maximum transmission unit. 1500
Primary DNS
Set the primary DNS. 8.8.8.8
Server
Secondary DNS
Set the secondary DNS. 223.5.5.5
Server
Enable or disable NAT function. When enabled, a
Enable NAT Enable
private IP can be translated to a public IP.
Table 3-4-1-1 Port Parameters
1. Static IP Configuration
52
If the external network assigns a fixed IP for the Ethernet port, user can select “Static IP”
mode.
Figure 3-4-1-2
Static IP
Item Description Default
IP Address Set the IP address which can access Internet. 192.168.23.150
Netmask Set the Netmask for Ethernet port. 255.255.255.0
Gateway Set the gateway's IP address for Ethernet port. 192.168.23.1
Multiple IP
Set the multiple IP addresses for Ethernet port. Null
Address
Table 3-4-1-2 Static IP Parameters
2. DHCP Client
If the external network has DHCP server enabled and has assigned IP addresses to the
Ethernet WAN interface, user can select “DHCP client” mode to obtain IP address
automatically.
53
Figure 3-4-1-3
DHCP Client
Item Description
Obtain peer DNS automatically during PPP dialing. DNS is
Use Peer DNS
necessary when user visits domain name.
Table 3-4-1-3 DHCP Client Parameters
3. PPPoE
PPPoE refers to a point to point protocol over Ethernet. User has to install a PPPoE client
on the basis of original connection way. With PPPoE, remote access devices can get
control of each user.
Figure 3-4-1-4
PPPoE
Item Description
Username Enter the username provided by your Internet Service Provider (ISP).
Password Enter the password provided by your Internet Service Provider (ISP).
Link Detection
Set the heartbeat interval for link detection. Range: 1-600.
Interval (s)
Max Retries Set the maximum retry times after it fails to dial up. Range: 0-9.
Obtain peer DNS automatically during PPP dialing. DNS is necessary
Use Peer DNS
when user visits domain name.
Table 3-4-1-4 PPOE Parameters
3.4.1.2 WLAN
This section explains how to set the related parameters for Wi-Fi network. UG65 supports
802.11 b/g/n, as AP or client mode.
54
Figure 3-4-1-5
Figure 3-4-1-6
WLAN Settings
Item Description
Enable Enable/disable WLAN.
55
Work Mode Select gateway's work mode. The options are "Client" or "AP".
Fill in the MAC address of the access point. Either SSID or BSSID
BSSID
can be filled to join the network.
SSID Fill in the SSID of the access point.
Client Mode
Scan Click "Scan" button to search the nearby access point.
Select encryption mode. The options are “No Encryption", “WEP
Open System" , “WEP Shared Key", “WPA-PSK", “WPA2-PSK" ,
Encryption Mode
“WPA-PSK/WPA2-PSK", “WPA-Enterprise”, “WPA2-Enterprise”and
“WPA-Enterprise/WPA2-Enterprise”.
Select cipher. The options are “Auto", “AES", “TKIP" and
Cipher
“AES/TKIP".
Key Fill the pre-shared key of WEP/WPA encryption.
XSupplicant Type Select from “Peap”, “Leap”, “TLS” and “TTLS”.
User Fill the user of WPA/WPA2-Enterprise.
Anonymous
Fill the anonymous identity of WPA/WPA2-Enterprise.
Identity
Phase2 Fill the phase2 of WPA/WPA2-Enterprise.
Public Server The public server certificate used for verifying with
Certificate WPA/WPA2-Enterprise access point.
AP Mode
When SSID broadcast is disabled, other wireless devices can't not
SSID Broadcast find the SSID, and users have to enter the SSID manually to
access to the wireless network.
When AP isolation is enabled, all users which access to the AP
AP Isolation
are isolated without communication with each other.
Select Radio type. The options are “802.11b (2.4 GHz)", “802.11g
Radio Type
(2.4 GHz)", “802.11n (2.4 GHz)””.
Channel Select wireless channel. The options are "Auto", "1", "2"......"11".
Select encryption mode. The options are “No Encryption", “WEP
Encryption Mode Open System" , “WEP Shared Key", “WPA-PSK", “WPA2-PSK" and
“WPA-PSK/WPA2-PSK".
Select cipher. The options are “Auto", “AES", “TKIP" and
Cipher
“AES/TKIP".
Fill the pre-shared key of WPA encryption. The default password
Key
is iotpassword.
Bandwidth Select bandwidth. The options are "20MHz" and "40MHz".
Set the maximum number of client to access when the gateway
Max Client Number
is configured as AP.
IP Setting
Protocol Set the protocol in wireless network.
IP Address Set the IP address in wireless network.
Netmask Set the netmask in wireless network.
56
Gateway Set the gateway in wireless network.
Table 3-4-1-5 WLAN Parameters
Figure 3-4-1-7
Client Mode-Scan
SSID Show SSID.
Channel Show wireless channel.
Signal Show wireless signal.
BSSID Show the MAC address of the access point.
Security Show the encryption mode.
Related Topic
57
Figure 3-4-1-8
Figure 3-4-1-9
General Settings
Item Description
Enable Check the option to enable cellular feature.
Select from "Auto”, "Auto 3G/4G”, "4G Only" and "3G Only".
Network Type Auto: connect to the network with the strongest signal
automatically.
58
4G Only: connect to 4G network only.
And so on.
Enter the Access Point Name for cellular dial-up connection
APN
provided by local ISP.
Enter the username for cellular dial-up connection provided by
Username
local ISP.
Enter the password for cellular dial-up connection provided by
Password
local ISP.
Enter the dial-up center NO. For cellular dial-up connection
Access Number
provided by local ISP.
PIN Code Enter a 4-8 characters PIN code to unlock the SIM.
Authentication
Select from "None", "PAP", "CHAP".
Type
59
Figure 3-4-1-10
Item Description
Connection Mode
Connection Mode Select from "Always Online" and "Connect on Demand".
Redial Interval(s) Set the time interval between redials. Range: 0-3600.
Set the maximum duration of the gateway when current link is
Max Idle Time(s)
under idle status. Range: 10-3600.
The gateway will switch from offline mode to cellular network
Triggered by Call mode automatically when it receives a call from the specific
phone number.
Select a call group for call trigger. Go to "System > General
Call Group
Settings > Phone" to set up phone group.
The gateway will switch from offline mode to cellular network
Triggered by SMS mode automatically when it receives a specific SMS from the
specific mobile phone.
Select a SMS group for trigger. Go to "System > General
SMS Group
Settings > Phone" to set up SMS group.
SMS Text Fill in the SMS content for triggering.
Table 3-4-1-8 Cellular Parameters
Related Topics
Cellular Connection Application Example
Phone Group
3.4.1.4 Loopback
Loopback interface is used for replacing gateway's ID as long as it is activated. When the
interface is DOWN, the ID of the gateway has to be selected again which leads to long
convergence time of OSPF. Therefore, Loopback interface is generally recommended as
the ID of the gateway.
Loopback interface is a logic and virtual interface on gateway. Under default conditions,
there's no loopback interface on gateway, but it can be created as required.
60
Figure 3-4-1-11
Loopback
Item Description Default
IP Address Unalterable 127.0.0.1
Netmask Unalterable 255.0.0.0
Multiple IP Apart from the IP above, user can configure other IP
Null
Addresses addresses.
Table 3-4-1-9 Loopback Parameters
by default, you can add a new VLAN label to certain interface by clicking .
Figure 3-4-1-12
VLAN Trunk
Item Description
Interface Select the VLAN interface, it’s fixed as eth0.
VID Set the label ID of the VLAN. Range: 1-4094.
Table 3-4-1-10 VLAN Trunk Parameters
3.4.2 Firewall
This section describes how to set the firewall parameters, including website block, ACL,
DMZ, Port Mapping and MAC Binding.
61
The firewall implements corresponding control of data flow at entry direction (from
Internet to local area network) and exit direction (from local area network to Internet)
according to the content features of packets, such as protocol style, source/destination IP
address, etc. It ensures that the gateway operate in a safe environment and host in local
area network.
3.4.2.1 Security
Figure 3-4-2-1
Website Blocking
URL Address Enter the HTTP address which you want to block.
You can block specific website by entering keyword. The
Keyword
maximum number of character allowed is 64.
Table 3-2-2-1 Security Parameters
3.4.2.2 ACL
Access control list, also called ACL, implements permission or prohibition of access for
specified network traffic (such as the source IP address) by configuring a series of
matching rules so as to filter the network interface traffic. When gateway receives packet,
the field will be analyzed according to the ACL rule applied to the current interface. After
the special packet is identified, the permission or prohibition of corresponding packet will
be implemented according to preset strategy.
The data package matching rules defined by ACL can also be used by other functions
requiring flow distinction.
62
Figure 3-4-2-2
Item Description
ACL Setting
Select from "Accept" and "Deny".
63
End Source Port Set end source port number. Range: 1-65535.
Destination Port Select destination port type, such as specified port, port range,
Type etc.
Destination Port Set destination port number. Range: 1-65535.
Start Destination
Set start destination port number. Range: 1-65535.
Port
End Destination Port Set end destination port number. Range: 1-65535.
More Details Show information of the port.
Interface List
Interface Select network interface for access control.
In ACL Select a rule for incoming traffic from ACL ID.
Out ACL Select a rule for outgoing traffic from ACL ID.
Table 3-4-2-2 ACL Parameters
Figure 3-4-2-4
Port Mapping
Item Description
Specify the host or network which can access local IP address.
Source IP
0.0.0.0/0 means all.
Enter the TCP or UDP port from which incoming packets are
Source Port
forwarded. Range: 1-65535.
Enter the IP address that packets are forwarded to after being
Destination IP
received on the incoming interface.
Enter the TCP or UDP port that packets are forwarded to after
Destination Port
being received on the incoming port(s). Range: 1-65535.
Protocol Select from "TCP" and "UDP" as your application required.
Description The description of this rule.
Table 3-4-2-4 Port Mapping Parameters
64
Related Configuration Example
NAT Application Example
3.4.2.3 DMZ
DMZ is a host within the internal network that has all ports exposed, except those
forwarded ports in port mapping.
Figure 3-4-2-3
DMZ
Item Description
Enable Enable or disable DMZ.
DMZ Host Enter the IP address of the DMZ host on the internal network.
Set the source IP address which can access to DMZ host.
Source Address
"0.0.0.0/0" means any address.
Table 3-4-2-3 DMZ Parameters
Figure 3-4-2-5
65
Item Description
MAC Address Set the binding MAC address.
IP Address Set the binding IP address.
Fill in a description for convenience of recording the meaning of the
Description
binding rule for each piece of MAC-IP.
Table 3-4-2-5 MAC Binding Parameters
3.4.3 DHCP
UG65 can be set as a DHCP server to distribute IP address when Wi-Fi work as AP mode.
Figure 3-4-3-1
DHCP Server
Item Description Default
Enable Enable or disable DHCP server. Enable
Only wlan interface is allowed to distribute IP
Interface wlan0
addresses.
Start Define the beginning of the pool of IP addresses
192.168.1.100
Address which will be leased to DHCP clients.
Define the end of the pool of IP addresses which will
End Address 192.168.1.199
be leased to DHCP clients.
Define the subnet mask of IP address obtained by
Netmask 255.255.255.0
DHCP clients from DHCP server.
Lease Time Set the lease time on which the client can use the IP 1440
66
(Min) address obtained from DHCP server. Range: 1-10080.
Primary
Set the primary DNS server. 8.8.8.8
DNS Server
Secondary
Set the secondary DNS server. Null
DNS Server
Windows Define the Windows Internet Naming Service obtained
Name by DHCP clients from DHCP sever. Generally you can Null
Server leave it blank.
Static IP
Set a static and specific MAC address for the DHCP
MAC
client (it should be different from other MACs so as to Null
Address
avoid conflict).
Set a static and specific IP address for the DHCP
IP Address Null
client (it should be outside of the DHCP range).
Table 3-4-3-1 DHCP Server Parameters
3.4.4 DDNS
Dynamic DNS (DDNS) is a method that automatically updates a name server in the Domain
Name System, which allows user to alias a dynamic IP address to a static domain name.
DDNS serves as a client tool and needs to coordinate with DDNS server. Before starting
configuration, user shall register on a website of proper domain name provider and apply
for a domain name.
Figure 3-4-4-1
DDNS
Item Description
Name Give the DDNS a descriptive name.
Interface Set interface bundled with the DDNS.
Service Type Select the DDNS service provider.
Username Enter the username for DDNS register.
User ID Enter User ID of the custom DDNS server.
Password Enter the password for DDNS register.
Server Enter the name of DDNS server.
Hostname Enter the hostname for DDNS.
Append IP Append your current IP to the DDNS server update path.
67
Table 3-4-4-1 DDNS Parameters
Figure 3-4-5-1
SLA
Item Description Default
SLA index. Up to 10 SLA settings can be added.
ID 1
Range: 1-10.
ICMP-ECHO is the default type to detect if the
Type icmp-echo
link is alive.
3.4.5.2 Track
Track setting is designed for achieving linkage among SLA module, Track module and
68
Application module. Track setting is located between application module and SLA module
with main function of shielding the differences of various SLA modules and providing
unified interfaces for application module.
Linkage between Track Module and SLA module
Once you complete the configuration, the linkage relationship between Track module and
SLA module will be established. SLA module is used for detection of link status, network
performance and notification of Track module. The detection results help track status
change timely.
- For successful detection, the corresponding track item is Positive.
- For failed detection, the corresponding track item is Negative.
Figure 3-4-5-2
69
switching).
Figure 3-4-5-3
WAN Failover
Parameters Description Default
Main Interface Select a link interface as the main link. --
Backup Interface Select a link interface as the backup link. --
Set how long to wait for the startup tracking detection policy
Startup Delay (s) 30
to take effect. Range: 0-300.
When the primary interface switches from failed detection
Up Delay (s) to successful detection, switching can be delayed based on 0
the set time. Range: 0-180 (0 refers to immediate switching)
When the primary interface switches from successful
detection to failed detection, switching can be delayed
Down Delay (s) 0
based on the set time. Range: 0-180 (0 refers to immediate
switching).
Track ID Track detection, select the defined track ID. --
Table 3-4-5-3 WAN Failover Parameters
3.4.6 VPN
Virtual Private Networks, also called VPNs, are used to securely connect two private
70
networks together so that devices can connect from one network to the other network via
secure channels.
UG65 supports DMVPN, IPsec, GRE, L2TP, PPTP, OpenVPN, as well as GRE over IPsec and
L2TP over IPsec.
3.4.6.1 DMVPN
A dynamic multi-point virtual private network (DMVPN), combining mGRE and IPsec, is a
secure network that exchanges data between sites without passing traffic through an
organization's headquarter VPN server or gateway.
Figure 3-4-6-1
Figure 3-4-6-2
DMVPN
Item Description
Enable Enable or disable DMVPN.
Hub Address The IP address or domain name of DMVPN Hub.
Local IP address DMVPN local tunnel IP address.
GRE Hub IP Address GRE Hub tunnel IP address.
GRE Local IP Address GRE local tunnel IP address.
71
GRE Netmask GRE local tunnel netmask.
GRE Key GRE tunnel key.
Negotiation Mode Select from "Main" and "Aggressive".
Authentication Select from "DES", "3DES", "AES128", "AES192" and
Algorithm "AES256".
Encryption Algorithm Select from "MD5" and "SHA1".
Select from "MODP768_1", "MODP1024_2" and
DH Group
"MODP1536_5".
Key Enter the preshared key.
Local ID Type Select from "Default", "ID", "FQDN", and "User FQDN"
IKE Life Time (s) Set the lifetime in IKE negotiation. Range: 60-86400.
Select from "DES_MD5", "DES_SHA1", "3DES_MD5",
"3DES_SHA1", "AES128_MD5", "AES128_SHA1",
SA Algorithm
"AES192_MD5", "AES192_SHA1", "AES256_MD5" and
"AES256_SHA1".
Select from "NULL", "MODP768_1", "MODP1024_2" and
PFS Group
"MODP1536-5".
Life Time (s) Set the lifetime of IPsec SA. Range: 60-86400.
DPD Interval Time (s) Set DPD interval time
DPD Timeout (s) Set DPD timeout.
Cisco Secret Cisco Nhrp key.
NHRP Holdtime (s) The holdtime of Nhrp protocol.
Table 3-4-6-1 DMVPN Parameters
3.4.6.2 IPSec
IPsec is especially useful for implementing virtual private networks and for remote user
access through dial-up connection to private networks. A big advantage of IPsec is that
security arrangements can be handled without requiring changes to individual user
computers.
IPsec provides three choices of security service: Authentication Header (AH),
Encapsulating Security Payload (ESP), and Internet Key Exchange (IKE). AH essentially
allows authentication of the senders’ data. ESP supports both authentication of the sender
and data encryption. IKE is used for cipher code exchange. All of them can protect one and
more data flows between hosts, between host and gateway, and between gateways.
72
Figure 3-4-6-3
IPsec
Item Description
Enable Enable IPsec tunnel. A maximum of 3 tunnels is allowed.
Enter the IP address or domain name of remote IPsec
IPsec Gateway Address
server.
IPsec Mode Select from "Tunnel" and "Transport".
IPsec Protocol Select from "ESP" and "AH".
Local Subnet Enter the local subnet IP address that IPsec protects.
Local Subnet Netmask Enter the local netmask that IPsec protects.
Local ID Type Select from "Default", "ID", "FQDN", and "User FQDN".
Remote Subnet Enter the remote subnet IP address that IPsec protects.
Remote Subnet Mask Enter the remote netmask that IPsec protects.
Remote ID type Select from "Default", "ID", "FQDN", and "User FQDN".
Table 3-4-6-2 IPsec Parameters
73
Figure 3-4-6-4
IKE Parameter
Item Description
IKE Version Select from "IKEv1" and "IKEv2".
Negotiation Mode Select from "Main" and "Aggressive".
Encryption Algorithm Select from "DES", "3DES", "AES128", "AES192" and "AES256".
Authentication
Select from "MD5" and " SHA1"
Algorithm
DH Group Select from "MODP768_1", "MODP1024_2" and "MODP1536_5".
Local Authentication Select from "PSK" and "CA".
Local Secrets Enter the preshared key.
XAUTH Enter XAUTH username and password after XAUTH is enabled.
Lifetime (s) Set the lifetime in IKE negotiation. Range: 60-86400.
SA Parameter
Select from "DES_MD5", "DES_SHA1", "3DES_MD5",
SA Algorithm "3DES_SHA1", "AES128_MD5", "AES128_SHA1", "AES192_MD5",
"AES192_SHA1", "AES256_MD5" and "AES256_SHA1".
Select from "NULL", "MODP768_1" , "MODP1024_2" and
PFS Group
"MODP1536_5".
Lifetime (s) Set the lifetime of IPsec SA. Range: 60-86400.
74
DPD Interval Time(s) Set DPD interval time to detect if the remote side fails.
DPD Timeout(s) Set DPD timeout. Range: 10-3600.
IPsec Advanced
Enable Compression The head of IP packet will be compressed after it's enabled.
Select from "NONE", "GRE" and "L2TP" to enable VPN over
VPN Over IPsec Type
IPsec function.
Table 3-4-6-3 IPsec Parameters
3.4.6.3 GRE
Generic Routing Encapsulation (GRE) is a protocol that encapsulates packets in order to
route other protocols over IP networks. It’s a tunneling technology that provides a channel
through which encapsulated data message can be transmitted and encapsulation and
decapsulation can be realized at both ends.
In the following circumstances the GRE tunnel transmission can be applied:
- GRE tunnel can transmit multicast data packets as if it were a true network interface.
Single use of IPSec cannot achieve the encryption of multicast.
- A certain protocol adopted cannot be routed.
- A network of different IP addresses shall be required to connect other two similar
networks.
Figure 3-4-6-5
GRE
Item Description
Enable Check to enable GRE function.
75
Remote IP Address Enter the real remote IP address of GRE tunnel.
Local IP Address Set the local IP address.
Local Virtual IP
Set the local tunnel IP address of GRE tunnel.
Address
Netmask Set the local netmask.
Peer Virtual IP Address Enter remote tunnel IP address of GRE tunnel.
Global Traffic All the data traffic will be sent out via GRE tunnel when this
Forwarding function is enabled.
Remote Subnet Enter the remote subnet IP address of GRE tunnel.
Remote Netmask Enter the remote netmask of GRE tunnel.
MTU Enter the maximum transmission unit. Range: 64-1500.
Key Set GRE tunnel key.
Enable NAT Enable NAT traversal function.
Table 3-4-6-4 GRE Parameters
3.4.6.4 L2TP
Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling
Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a
virtual private network (VPN) over the Internet.
Figure 3-4-6-6
L2TP
Item Description
Enable Check to enable L2TP function.
Remote IP Address Enter the public IP address or domain name of L2TP server.
76
Username Enter the username that L2TP server provides.
Password Enter the password that L2TP server provides.
Select from "Auto", "PAP", "CHAP", "MS-CHAPv1" and
Authentication
"MS-CHAPv2".
Global Traffic All of the data traffic will be sent out via L2TP tunnel after
Forwarding this function is enabled.
Remote Subnet Enter the remote IP address that L2TP protects.
Remote Subnet Mask Enter the remote netmask that L2TP protects.
Key Enter the password of L2TP tunnel.
Use L2TP Peer DNS Enable to use the DNS address of peer L2TP server .
Table 3-4-6-5 L2TP Parameters
Figure 3-4-6-7
Advanced Settings
Item Description
Set tunnel IP address of L2TP client. Client will obtain
Local IP Address tunnel IP address automatically from the server when it's
null.
Peer IP Address Enter tunnel IP address of L2TP server.
Enable NAT Enable NAT traversal function.
Enable MPPE Enable MPPE encryption.
Address/Control
For PPP initialization. User can keep the default option.
Compression
Protocol Field
For PPP initialization. User can keep the default option.
Compression
One of the PPP protocol initialization strings. User can keep
Asyncmap Value
the default value. Range: 0-ffffffff.
77
MRU Set the maximum receive unit. Range: 64-1500.
MTU Set the maximum transmission unit. Range: 64-1500
Link Detection Interval Set the link detection interval time to ensure tunnel
(s) connection. Range: 0-600.
Set the maximum times of retry to detect the L2TP
Max Retries
connection failure. Range: 0-10.
User can enter some other PPP initialization strings in this
Expert Options
field and separate the strings with blank space.
Table 3-4-6-6 L2TP Parameters
3.4.6.5 PPTP
Point-to-Point Tunneling Protocol (PPTP) is a protocol that allows corporations to extend
their own corporate network through private "tunnels" over the public Internet. Effectively, a
corporation uses a wide-area network as a single large local area network.
Figure 3-4-6-8
PPTP
Item Description
Enable Enable PPTP client. A maximum of 3 tunnels is allowed.
Enter the public IP address or domain name of PPTP
Remote IP Address
server.
Username Enter the username that PPTP server provides.
Password Enter the password that PPTP server provides.
Select from "Auto", "PAP", "CHAP", "MS-CHAPv1", and
Authentication
"MS-CHAPv2".
Global Traffic All of the data traffic will be sent out via PPTP tunnel once
Forwarding enable this function.
Remote Subnet Set the peer subnet of PPTP.
78
Remote Subnet
Set the netmask of peer PPTP server.
Mask
Table 3-4-6-7 PPTP Parameters
Figure 3-4-6-9
79
3.4.6.6 OpenVPN Client
OpenVPN is an open source virtual private network (VPN) product that offers a simplified
security framework, modular network design, and cross-platform portability. UG65
supports running at most 3 OpenVPN clients at the same time. You can import the ovpn
file directly or configure the parameters on this page to set clients.
Figure 3-4-6-10
Figure 3-4-6-11
80
Enter the TCP/UCP service number of remote OpenVPN server. Range:
Port
1-65535.
Select virtual VPN network interface type from TUN and TAP. TUN
Interface devices encapsulate IPv4 or IPv6 (OSI Layer 3) while TAP devices
encapsulate Ethernet 802.3 (OSI Layer 2).
Select authentication type used to secure data sessions.
Pre-shared: use the same secret key as server to complete the
authentication. After selecting, go to Network > VPN > Certifications page
to import a static.key to PSK field.
Username/Password: use username/password which is preset in server
Authentication Type side to complete the authentication.
X.509 cert: use X.509 type certificate to complete the authentication.
After selecting, go to Network > VPN > Certifications page to import CA
certificate, client certificate and client private key to corresponding fields.
X.509 cert + user: use both username/password and X.509 cert
authentication type.
Local Virtual IP Set local tunnel address when authentication type is None or Pre-shared.
Set remote tunnel address when authentication type is None or
Remote Virtual IP
Pre-shared.
Global Traffic All the data traffic will be sent out via OpenVPN tunnel when this function
Forwarding is enabled.
Disable or enable TLS authentication when authentication type is X.509
cert. After being enabled, go to Network > VPN > Certifications page to
Enable TLS import a ta.key to TA field.
Authentication Note: this option only supports tls-auth. For tls-crypt, please add this
format string on expert option: tls-crypt
/etc/openvpn/openvpn-client1-ta.key
Compression Select to enable or disable LZO to compress data.
Set link detection interval time to ensure tunnel connection. If this is set
Link Detection Interval
on both server and client, the value pushed from server will override the
(s)
client local values. Range: 10-1800 s.
OpenVPN will be reestablished after timeout. If this is set on both server
Link Detection
and client, the value pushed from server will override the client local
Timeout (s)
values. Range: 60-3600 s.
Select from NONE, BF-CBC, DES-CBC, DES-EDE3-CBC, AES-128-CBC,
Cipher
AES-192-CBC and AES-256-CBC.
MTU Enter the maximum transmission unit. Range: 128-1500.
Max Frame Size Set the maximum frame size. Range: 128-1500.
Verbose Level Select from ERROR, WARING, NOTICE and DEBUG.
User can enter some initialization strings in this field and separate the
Expert Options strings with semicolon.
Example: ncp-ciphers AES-128-GCM; key direction 1
Local Route
Subnet Set the local route's IP address.
81
Subnet Mask Set the local route's netmask.
Figure 3-4-6-12
82
Figure 3-4-6-13
Figure 3-4-6-14
83
server will bind to all interfaces.
Enter the TCP/UCP service number for OpenVPN client connection.
Port
Range: 1-65535.
Select virtual VPN network interface type from TUN and TAP. TUN
Interface devices encapsulate IPv4 or IPv6 (OSI Layer 3) while TAP devices
encapsulate Ethernet 802.3 (OSI Layer 2).
Select authentication type used to secure data sessions.
Pre-shared: use the same secret key as server to complete the
authentication. After select, go to Network > VPN > Certifications page to
import a static.key to PSK field.
Username/Password: use username/password which is preset in server
Authentication Type side to complete the authentication.
X.509 cert: use X.509 type certificate to complete the authentication.
After select, go to Network > VPN > Certifications page to import CA
certificate, client certificate and client private key to corresponding fields.
X.509 cert + user: use both username/password and X.509 cert
authentication type.
Local Virtual IP Set local tunnel address when authentication type is None or Pre-shared.
Set remote tunnel address when authentication type is None or
Remote Virtual IP
Pre-shared.
Client Subnet Define an IP address pool for openVPN client.
Client Netmask Set the client subnet netmask to limit the IP address range.
Renegotiation Interval Renegotiate data channel key after this interval. 0 means disable.
Limit server to a maximum of concurrent clients, range: 1-20.
Max Clients Note: please adjust log severity to Info if you need to connect many
clients.
Enable CRL Enable or disable CRL verify.
Enable Client to Client When enabled, openVPN clients can communicate with each other.
Allow multiple clients to connect with the same common name or
Enable Dup Client
certification.
Disable or enable TLS authentication when authentication type is X.509
cert. After being enabled, go to Network > VPN > Certifications page to
Enable TLS import a ta.key to TA field.
Authentication Note: this option only supports tls-auth. For tls-crypt, please add this
format string on expert option: tls-crypt
/etc/openvpn/openvpn-client1-ta.key
Compression Select to enable or disable LZO to compress data.
Set link detection interval time to ensure tunnel connection. If this is set
Link Detection Interval
on both server and client, the value pushed from server will override the
(s)
client local values. Range: 10-1800 s.
OpenVPN will be reestablished after timeout. If this is set on both server
Link Detection
and client, the value pushed from server will override the client local
Timeout (s)
values. Range: 60-3600 s.
Cipher Select from NONE, BF-CBC, DES-CBC, DES-EDE3-CBC, AES-128-CBC,
84
AES-192-CBC and AES-256-CBC.
MTU Enter the maximum transmission unit. Range: 64-1500.
Max Frame Size Set the maximum frame size. Range: 64-1500.
Verbose Level Select from ERROR, WARING, NOTICE and DEBUG.
User can enter some initialization strings in this field and separate the
Expert Options strings with semicolon.
Example: ncp-ciphers AES-128-GCM; key direction 1
Account
Set username and password for OpenVPN client when authentication type
Username & Password
is username/password.
Local Route
Subnet Set the local route's IP address.
Subnet Mask Set the local route's netmask.
Client Subnet
Name Set the name as OpenVPN client certificate common name.
Subnet Set the subnet of OpenVPN client.
Subnet Mask Set the subnet netmask of OpenVPN client.
Table 3-4-6-12 OpenVPN Server Parameters
3.4.6.8 Certifications
When working as OpenVPN server, OpenVPN client or IPsec Server, user can import/export
necessary certificate and key files to this page according to the authentication types.
Figure 3-4-6-15
85
Figure 3-4-6-16
Figure 3-4-6-17
3.5 System
This section describes how to configure general settings, such as administration account,
access service, system time, common user management, SNMP, event alarms, etc.
3.5.1.1 General
General settings include system info, access service and HTTPS certificates.
86
Figure 3-5-1-1
General
Item Description Default
System
Hostname User-defined gateway name, needs to start with a letter. GATEWAY
Web Login
You need to log in again if it times out. Range: 100-3600. 1800
Timeout (s)
Access Service
Port Set port number of the services. Range: 1-65535. --
Users can log in the device locally via HTTP to access
HTTP 80
and control it through Web after the option is checked.
Users can log in the device locally and remotely via
HTTPS HTTPS to access and control it through Web after 443
option is checked.
Users can log in the device locally and remotely via
TELNET TELNET to access and control it through Web after 23
option is checked.
Users can log in the device locally and remotely via SSH
SSH 22
after the option is checked.
HTTPS Certificates
Click "Browse" button, choose certificate file on the PC,
and then click "Import" button to upload the file into
Certificate --
gateway. Click "Export" button will export the file to the
PC. Click "Delete" button will delete the file.
87
Click "Browse" button, choose key file on the PC, and
then click "Import" button to upload the file into gateway.
Key Click "Export" button will export file to the PC. --
Figure 3-5-1-2
System Time
Item Description
Current Time Show the current system time.
Time Zone Click the drop down list to select the time zone you are in.
Click the drop down list to select the time synchronization
type.
Sync Type Sync with Browser: Synchronize time with browser.
Sync with NTP Server: Synchronize time with NTP Server.
Set up Manually: configure the time manually.
Sync with NTP Server
NTP Server Address Set NTP server address (domain name/IP).
After checked, NTP client on the network can achieve time
Enable NTP Server
synchronization with gateway.
Table 3-5-1-2 System Time Parameters
3.5.1.3 SMTP
SMTP, short for Simple Mail Transfer Protocol, is a TCP/IP protocol used in sending and
receiving e-mail. This section describes how to configure email settings.
88
Figure 3-5-1-3
SMTP
Item Description
SMTP Client Settings
Enable Enable or disable SMTP client function.
Email Address Enter the sender's email address.
Username Enter the sender's email username.
Password Enter the sender's email password.
SMTP Server Address Enter SMTP server's domain name.
Port Enter SMTP server port. Range: 1-65535.
Enable TLS Enable or disable TLS encryption.
Table 3-5-1-3 SMTP Setting
Related Topics
Events Setting
3.5.1.4 Phone
Phone settings involve in call/SMS trigger and SMS alarm for events. This is only applied to
gateway with cellular feature.
89
Figure 3-5-1-4
Phone
Item Description
Phone Number List
Name Set phone group name.
Enter the telephone number. Digits, "+" and "-" are allowed.
Number
You can divide multiple numbers by “;”.
Table 3-5-1-4 Phone Settings
Related Topic
Connect on Demand
3.5.1.5 Email
Email settings involve email alarm for events.
Figure 3-5-1-5
Email
Item Description
Email List
Name Set Email group name.
Enter the Email address. You can divide multiple Email
Email Address
addresses by “;”.
Table 3-5-1-5 Email Settings
90
3.5.2.1 Account
Here you can change the login username and password of the administrator.
Note: it is strongly recommended that you modify them for the sake of security.
Figure 3-5-2-1
Account
Item Description
Enter a new username. You can use characters such as a-z,
Username
0-9, "_", "-", "$". The first character can't be a digit.
Old Password Enter the old password.
Enter a new password. You can use any ASCII characters
New Password
except blank.
Confirm New Password Enter the new password again.
Table 3-5-2-1 Account Information
Figure 3-5-2-2
User Management
Item Description
Enter a new username. You can use characters such as a-z,
Username
0-9, "_", "-". The first character can't be a digit.
Password Set password. You can use any ASCII characters except
91
blank.
Select user permission from “Read-Only” and “Read-Write”.
- Read-Only: users can only view the configuration of
Permission gateway in this level.
- Read-Write: users can view and set the configuration of
gateway in this level.
Table 3-5-2-2 User Management
3.5.3 SNMP
SNMP is widely used in network management for network monitoring. SNMP exposes
management data with variables form in managed system. The system is organized in a
management information base (MIB) which describes the system status and configuration.
These variables can be remotely queried by managing applications.
Configuring SNMP in networking, NMS, and a management program of SNMP should be
set up at the Manager.
Configuration steps are listed as below for achieving query from NMS:
1. Enable SNMP setting.
2. Download MIB file and load it into NMS.
3. Configure MIB View.
4. Configure VCAM.
3.5.3.1 SNMP
UG65 supports SNMPv1, SNMPv2c and SNMPv3 version. SNMPv1 and SNMPv2c employ
community name authentication. SNMPv3 employs authentication encryption by username
and password.
Figure 3-5-3-1
92
SNMP Settings
Item Description
Enable Enable or disable SNMP function.
Set SNMP listened port. Range: 1-65535.
Port
The default port is 161.
System Name Fill in the system name to represent the gateway.
SNMP Version Select SNMP version; support SNMP v1/v2c/v3.
Location Information Fill in the location information.
Contact Information Fill in the contact information.
Table 3-5-3-1 SNMP Parameters
Figure 3-5-3-2
MIB View
Item Description
View Name Set MIB view's name.
View Filter Select from "Included" and "Excluded".
View OID Enter the OID number.
Included You can query all nodes within the specified MIB node.
Excluded You can query all nodes except for the specified MIB node.
Table 3-5-3-2 MIB View Parameters
3.5.3.3 VACM
This section describes how to configure VCAM parameters.
93
Figure 3-5-3-3
VACM
Item Description
SNMP v1 & v2 User List
Community Set the community name.
Permission Select from "Read-Only" and "Read-Write".
MIB View Select an MIB view to set permissions from the MIB view list.
Network The IP address and bits of the external network accessing the MIB view.
Read-Write The permission of the specified MIB node is read and write.
Read-Only The permission of the specified MIB node is read only.
SNMP v3 User List
Group Name Set the name of SNMPv3 group.
Security Level Select from "NoAuth/NoPriv", "Auth/NoPriv", and " Auth/Priv".
Select an MIB view to set permission as "Read-only" from the MIB view
Read-Only View
list.
Select an MIB view to set permission as "Read-write" from the MIB view
Read-Write View
list.
Inform View Select an MIB view to set permission as "Inform" from the MIB view list.
Table 3-5-3-3 VACM Parameters
3.5.3.4 Trap
This section explains how to enable network monitoring by SNMP trap.
Figure 3-5-3-4
94
SNMP Trap
Item Description
Enable Enable or disable SNMP Trap function.
SNMP Version Select SNMP version; support SNMP v1/v2c/v3.
Server Address Fill in NMS's IP address or domain name.
Fill in UDP port. Port range is 1-65535. The default port is
Port
162.
Fill in the group name when using SNMP v1/v2c; fill in
Name
the username when using SNMP v3.
Select from "NoAuth & No Priv", "Auth & NoPriv", and
Auth/Priv Mode
"Auth & Priv".
Table 3-5-3-4 Trap Parameters
3.5.3.5 MIB
This section describes how to download MIB files.
Figure 3-5-3-5
MIB
Item Description
MIB File Select the MIB file you need.
Download Click "Download" button to download the MIB file to PC.
Table 3-5-3-5 MIB Download
95
3.5.4.2 Management Platform
You can connect the device to the DeviceHub or Milesight Development Platform on this
page so as to manage the gateway centrally and remotely.
Figure 3-5-4-1
Management Platform
Item Description
Enable Enable or disable to connect gateway to management platform.
Milesight DeviceHub 1.0 or Milesight Development Platform is
Platform Type
optional.
96
Show the connection status between the gateway and the
Status
management platform.
DeviceHub 1.0
Activation Server
IP address or domain of the DeviceHub.
Address
DeviceHub
The URL address for the device to connect to the DeviceHub,
Management
e.g. http://220.82.63.79:8080/acs.
Address
Select activation method to connect the gateway to the
Activation Method
DeviceHub server, options are "By Authentication ID" and "By ID".
Authentication Code Fill in the authentication code generated from the DeviceHub.
ID
Fill in the registered DeviceHub account (email) and password.
Password
Table 3-5-4-1
3.5.5 Events
Event feature is capable of sending alerts by Email when certain system events occur.
3.5.5.1 Events
You can view alarm messages on this page.
Figure 3-5-5-1
Events
Item Description
Mark as Read Mark the selected event alarm as read.
Delete Delete the selected event alarm.
Mark All as Read Mark all event alarms as read.
Delete All Alarms Delete all event alarms.
97
Status Show the reading status of the event alarms.
Type Show the event type that should be alarmed.
Time Show the alarm time.
Message Show the alarm content.
Table 3-5-5-1 Events Parameters
Figure 3-5-5-2
Event Settings
Item Description
Enable Check to enable "Events Settings".
Phone for
Select phone group to receive SMS alarm.
Notification
Email for
Select Email group to receive Email alarm.
Notification
Events Event type the gateway supports to record.
98
The relevant content of event alarm will be recorded on "Event"
Record
page if this option is checked.
The relevant content of event alarm will be sent out via email if
Email
this option is checked.
Click and you will be redirected to the page "Email" to configure
Email Setting
the Email group.
The relevant content of event alarm will be sent out via SMS if
SMS
this option is checked.
Click and you will be redirected to the page of "Phone" to
SMS Setting
configure phone group list.
Phone Group List Select phone group to receive SMS alarm.
Email Group List Select Email group to receive Email alarm.
Table 3-5-5-2 Events Parameters
Related Topics
Email Setting
Phone Setting
3.6 Maintenance
This section describes system maintenance tools and management.
3.6.1 Tools
Troubleshooting tools includes ping and traceroute.
3.6.1.1 Ping
Ping tool is engineered to ping outer network.
Figure 3-6-1-1
PING
Item Description
Host Ping outer network from the gateway.
Table 3-6-1-1 IP Ping Parameters
3.6.1.2 Traceroute
Traceroute tool is used for troubleshooting network routing failures.
99
Figure 3-6-1-2
Traceroute
Item Description
Host Address of the destination host to be detected.
Table 3-6-1-2 Traceroute Parameters
3.6.1.3 Qxdmlog
This section allow collecting diagnostic logs of cellular module via QXDM tool.
Figure 3-6-1-3
3.6.2 Schedule
This section explains how to configure scheduled reboot on the gateway.
Figure 3-6-2-1
Schedule
Item Description
Schedule Select schedule event:
100
Reboot: Reboot the gateway regularly.
Frequency Select the frequency to execute the schedule.
Hour & Minute Select the time to execute the schedule.
Table 3-6-2-1 Schedule Parameters
3.6.3 Log
The system log contains a record of informational, error and warning events that indicates
how the system processes. By reviewing the data contained in the log, an administrator or
user troubleshooting the system can identify the cause of a problem or whether the system
processes are loading successfully. Remote log server is feasible, and gateway will upload
all system logs to remote log server such as Syslog Watcher.
Figure 3-6-3-1
System Log
Item Description
Download Download log file.
View recent (lines) View the specified lines of system log.
Clear Log Clear the current system log.
Table 3-6-3-1 System Log Parameters
101
Figure 3-6-3-2
Log Settings
Item Description
Remote Log Server
With “Remote Log Server” enabled, gateway will send all
Enable
system logs to the remote server.
Fill in the remote system log server address (IP/domain
Syslog Server Address
name).
Port Fill in the remote system log server port.
Local Log File
Storage User can store the log file in memory.
Size Set the size of the log file to be stored.
Log Severity The list of severities follows the syslog protocol.
Table 3-6-3-2 System Log Parameters
3.6.4 Upgrade
This section describes how to upgrade the gateway firmware via web. Generally you don’t
need to do the firmware upgrade.
Note: any operation on web page is not allowed during firmware upgrade, otherwise the
upgrade will be interrupted, or even the device will break down.
102
Figure 3-6-4-1
Upgrade
Item Description
Firmware Version Show the current firmware version.
Reset Configuration to When this option is checked, the gateway will be reset to
Factory Default factory defaults after upgrade.
Click "Browse" button to select the new firmware file, and
Upgrade Firmware
click "Upgrade" to upgrade firmware.
Table 3-6-4-1 Upgrade Parameters
103
Figure 3-6-5-1
3.6.6 Reboot
On this page you can reboot the gateway and return to the login page. We strongly
recommend clicking “Save” button before rebooting the gateway so as to avoid losing the
new configuration.
Figure 3-6-6-1
104
3.7 APP
3.7.1 Python
Python is an object-oriented programming language that has gained popularity because of
its clear syntax and readability.
As an interpreted language, Python has a design philosophy that emphasizes code
readability, notably using whitespace indentation to delimit code blocks rather than curly
brackets or keywords, and a syntax that allows programmers to express concepts in fewer
lines of code than it’s used in other languages such as C++ or Java. The language provides
constructs and intends to enable writing clear programs on both small and large scale.
Users can use Python to quickly generate the prototype of the program, which can be the
final interface of the program, rewrite it with a more appropriate language, and then
encapsulate the extended class library that Python can call.
This section describes how to view the relevant running status such as App-manager, SDK
version, extended storage, etc. Also you can change the App-manager configuration, and
import the Python App package from here.
3.7.1.1 Python
Figure 3-7-1-1
Python
Item Description
Show AppManager's running status, like "Uninstalled",
AppManager Status
"Running" or "Stopped".
SDK Version Show the version of the installed SDK.
SDK Path Show the SDK installation path.
Available Storage Select available storage to install SDK.
SDK Upload Upload and install SDK for Python.
105
Uninstall Uninstall SDK.
View View application status managed by AppManager.
Table 3-7-1-1 Python Parameters
Figure 3-7-1-2
AppManager Configuration
Item Description
After enabling Python AppManager, user can click "View" button on
Enable the "Python" webpage to view the application status managed by
AppManager.
App Management
ID Show the ID of the imported App.
App Command Show the name of the imported App.
Logfile Size(MB) User-defined Logfile size. Range: 1-50.
Uninstall Uninstall APP.
App Status
App Name Show the name of the imported App.
App Version Show the version of the imported App.
SDK Version Show the SDK version which the imported App is based on.
Table 3-7-1-2 APP Manager Parameters
106
Figure 3-7-1-3
Python APP
Item Description
App Package Select App package and import.
App Name Select App to import configuration.
App Configuration Select configuration file and import.
Debug File Export script file.
Debug Script Select Python script to be debugged and import.
Table 3-7-1-3 APP Parameters
3.7.2 Node-RED
Node-RED is a flow-based development tool for visual programming and wiring together
hardware devices, APIs and online services as part of the Internet of Things. Node-RED
provides a web-browser-based flow editor, which can easily wire together flows using the
wide range of nodes in the palette. For more guidance and documentation please refer to
Node-RED official website.
3.7.2.1 Node-RED
107
Figure 3-7-2-1
Node-RED
Item Description
Enable Enable the Node-RED.
Launch Click to launch the web GUI of Node-RED.
Show the version of the Node-RED. The Node-RED version
Node-RED Version
can be upgraded only when you upgrade the gateway.
Node Library Version Show the version of the node library.
Upgrade Node Library Upgrade the node library by importing the library package.
All Flows Export Export all flows as a JSON format file.
Restore Factory Default Erase all flow data of Node-RED.
Table 3-7-2-1 Node-RED Parameters
Milesight provides a customized node library to use the interfaces of the gateway.
108
Figure 3-7-2-2
Node Library
Node Description
Receive LoRaWAN® packets from the gateway. This only works when
LoRa Input
the network server is enabled.
LoRa Output Send downlink commands to LoRaWAN® nodes.
Filter out the data of one or more specific LoRaWAN® nodes via
Device Filter
device EUIs.
109
Chapter 4 Application Examples
4.1 Restore Factory Defaults
Method 1:
Log in web interface, and go to Maintenance > Backup and Restore, click Reset button, you
will be asked to confirm if you’d like to reset it to factory defaults. Then click Reset button.
Then the gateway will reboot and restore to factory settings immediately.
Please wait till SYS light staticly and the login page pops up again, which means the
gateway has already been reset to factory defaults successfully.
Related Topic
Restore Factory Defaults
Method 2:
Locate the reset button on the gateway, press and hold the reset button for more than 5s
110
until the SYS LED blinks.
Related Topic
Upgrade
111
2. Connect Ethernet port of gateway to devices like router or modem.
3. Go to “Maintenance > Tools > Ping” to check network connectivity.
Related Topic
Port Setting
112
2. Go to “Status > Cellular” to view the status of the cellular connection. If it shows
'Connected', SIM has dialed up successfully.
Related Topic
Cellular Setting
113
Cellular Status
Click “Save” and “Apply” buttons after all configurations are done.
2. Use a smart phone to connect the access point of gateway. Go to “Status > WLAN”, and
you can check the AP settings and information of the connected client/user.
114
4.5.2 Client Mode
Application Example
Configure UG65 as Wi-Fi client to connect to an access point to have Internet access.
Configuration Steps
1. Go to “Network > Interface > WLAN” and click “Scan” to search for WiFi access point.
2. Select one access point and click “Join Network”, then type the password of the access
point.
115
Click “Save” and “Apply” buttons after all configurations are done.
3. Go to “Status > WLAN”, and you can check the connection status of the client.
Related Topic
WLAN Setting
WLAN Status
116
4.6 Packet Forwarder Configuration
UG65 gateway has installed multiple packet forwarders including Semtech, Basic station,
Chirpstack-Generic, etc. Before connecting make sure the gateway has connected to
network.
1. Go to “Packet Forwarder” > “General”.
2. Click to add a new network server. Fill in the network server information and
enable this server.
3. Go to “Packet Forwarder > Radio” page to configure antenna type, center frequency and
channels. The channels of the gateway and network server need to be the same.
117
4. Add the gateway on network server page. For more details about the network server
connection please refer to Milesight IoT Support portal.
5. Go to “Traffic” page to view the data communication of UG65.
118
2. Go to “Packet Forwarder > Radio” page to select the antenna type, center frequency and
channels. The channels of the gateway and nodes need to be the same.
3. Go to “Network Server > General” page to enable the network server and “Cloud mode”,
then select “Milesight IoT Cloud”.
119
4. Log in the Milesight IoT Cloud. Then go to “My Devices” page and click “+New Devices”
to add gateway to Milesight IoT Cloud via SN. Gateway will be added under “Gateways”
menu.
120
1. Go to “Network Server” > “Application”.
Step 2: Enter the destination URL. Different types of data can be sent to different URLs.
Enter the header name and header value if there is user credentials when accessing the
HTTP(s) server.
MQTT:
Step 1: select the transmission protocol as MQTT.
Step 2: Fill in MQTT broker general settings.
121
Step 3: Select the authentication method required by the server.
If you select user credentials for authentication, you need to enter the username and
password for authentication.
If certificate is necessary for verification, please select mode and import CA certificate,
client certificate and client key file for authentication.
Step 4: Enter the topic to receive data and choose the QoS.
122
4.9 Device Configuration
Go to “Device” page and click “Add” to add LoRaWAN® node devices. Please select correct
device profile according to device type.
You can also click “Bulk Import” if you want to add many nodes all at once.
Click “Template Download” to download template file and add device information to this
file. Application and device profile should be the same as you created on web page.
123
Import this file to add bulks of devices.
2. Fill in the device EUI or select the multicast group which you need to send downlinks.
Then fill in the downlink commands, ports.
3. Click “Send”.
4. Check the packet in the network server list to make sure that the device has received this
message successful. It’s suggested to enable “Confirmed”. Multicast feature does not
support confirmed downlinks.
You can click “Refresh” to refresh the list or set automatic refreshing frequency for the list.
If the device’s class type is Class C, then the device will constantly receive packets.
This packet’s type is DnCnf (Downlink Confirmed Packet) and if the packet’s color is gray,
then it means the packet cannot be transmitted now because at least one message has
been in the queue. If the packet record is white, it means the packet has been delivered
successfully.
If the device receives this downlink confirmed packet, then the device will reply “ACK” when
delivering next.
124
Ack is “true” means that the device has received this packet.
If the device’s class type is Class A, only after the device sends out an uplink packet will the
network server sends out data to the device.
125
Related Topic
Packets
4.11 Node-RED
4.11.1 Start the Node-RED
2. After enabled, click “Launch” to go to the Node-RED web GUI and to log in with the same
126
4.11.2 Send Data by Email
Application Example
Send AM104 device data by Email.
Configuration Steps
1. Add a “LoRa Input” node. Before adding please ensure network server mode is enabled
and LoRaWAN devices have joined the network.
2. If you add many devices and only need one device data, add “Device Filter” node behind
the “LoRa Input” and type the device EUI.
127
4. Add an “Email Output” and type the SMTP client settings, destination email address and
contents. Example content:
The time is {{time}}
Deveui is {{deveui}}
Humidity is {{payload.humidity}}
Note:
1) When you select SMTP Option as “Same as Gateway”, go to “System -> General Settings
-> SMTP” to configure the SMTP clients.
2) Basic format to call LoRaWAN node data is {{property name}}, you can click “Help” page
for more info about the Email or SMS payload format.
3) If you need to check the output content in every node, please add debug node.
5. After completing the configuration, click “Deploy” to save all your configuration.
6. When AM104 sends data to gateway, gateway will transfer the data to email.
128
Related Topic
Node-RED
[END]
129